CVE-2021-3007

CRITICAL EXPLOITED IN THE WILD NUCLEI

Laminas Project laminas-http <2.14.2 - Code Injection

Title source: llm

Description

Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized

Exploits (3)

nomisec WORKING POC 1 stars
by Vulnmachines · local
https://github.com/Vulnmachines/ZF3_CVE-2021-3007
nomisec WORKING POC
by KrE80r · poc
https://github.com/KrE80r/cve-2021-3007-vulnerable
nomisec WORKING POC
by yunus-a1i · remote
https://github.com/yunus-a1i/CVE-2021-3007-docker-poc

Nuclei Templates (1)

Laminas Project laminas-http - Remote Code Execution
CRITICALVERIFIEDby 0xanis
Shodan: http.html:"laminas"

Scores

CVSS v3 9.8
EPSS 0.9027
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2021-01-14
InTheWild.io 2021-01-08

Classification

CWE
CWE-502
Status published

Affected Products (4)

getlaminas/laminas-http < 2.14.2
zend/zend_framework
zendframework/zendframework Packagist
laminas/laminas-http < 2.14.2Packagist

Timeline

Published Jan 04, 2021
Tracked Since Feb 18, 2026